Professional Documents
Culture Documents
Project Phase 1 Report
Project Phase 1 Report
PHASE I REPORT
Submitted by
of
MASTER OF ENGINEERING
in
JANUARY 2022
i
ANNA UNIVERSITY : : CHENNAI
BONAFIDE CERTIFICATE
who carried out the work under my supervision. Certified further, that to the best of my
knowledge the work reported herein does not form part of any other project report or
SIGNATURE SIGNATURE
HEAD OF THE DEPARTMENT SUPERVISOR
Mrs. Anon K Jenifer MCA.,M.E.,(PhD) Mrs. Sherina, M.E.,
Professor and Head, Assistant Professor,
Department of CSE, Department of CSE,
Rajas Institute of Technology, Rajas Institute of Technology,
Ozhuginasery, Nagercoil. Ozhuginasery, Nagercoil.
ii
ABSTRACT
With the increasing popularity of cloud-based data services, data owners are highly
motivated to store their huge amount of potentially sensitive personal data files on remote
servers in encrypted form. Clients later can query over the encrypted database to retrieve
files while protecting privacy of both the queries and the database, by allowing some
reasonable leakage information. To this end, the notion of searchable symmetric
encryption (SSE) was proposed. Meanwhile, recent literature has shown that most
dynamic SSE solutions leaking information on updated keywords are vulnerable to
devastating file-injection attacks. The only way to thwart these attacks is to design
forward-private schemes. In this project, I investigate new privacy-preserving indexing
and query processing protocols which meet a number of desirable properties, including
the multi-keyword query processing with conjunction and disjunction logic queries,
practically high privacy guarantees with adaptive chosen keyword attack NTLRU security
and forward privacy, and the support of dynamic data operations, etc. Compared to
previous schemes, our solutions are highly compact, practical and flexible. Their
performance and security are carefully characterized by rigorous analysis. Experimental
evaluations conducted over a large representative dataset demonstrate that our solutions
can achieve modest search time efficiency, and they are practical for use in large-scale
encrypted database systems.
iii
சுருக்கம்
iv
ACKNOWLEDGEMENT
All Praise, Glory and Honor to the Lord Almighty, source of all knowledge for his
gracious presence and guidance that enabled us to complete this project in due time.
Our sincere thanks and profound sense of gratitude to the chairman, Dr.S.A.Joy
Raja,MBA.,Ph.D(USA) ,the corner stone of this institution for giving me the opportunity to pursue
our studies and for providing the complaisant atmosphere to the project work.
We would like to express our gratitude and regards to our principle, Dr.A.Senthil
Kumar,M.E.,Ph.D, for wishes and kind cooperation in all aspects ofthe completion of this project.
We extend our hearty thanks to, our Head of the department and project Coordinator
With profound indebtedness we thank Mrs. Sherina.,M.E., ourguide for her constant
encouragement and proficient guidance that enabled us to complete the project efficaciously.
With great interest we express our thanks to all the Members of the
information and for the sustained interest shown for the completion this
academic exercise. Our whole hearted gratitude and thanks to my parents and
v
TABLE OF CONTENTS
CHAPTER PAGE
TITLE
NO NO
ABSTRACT iii
LIST OF TABLES ix
LIST OF FIGURES x
LIST OF ABBREVIATION xi
1 INTRODUCTION 1
1.4 OBJECTIVE 5
1.5 ADVANTAGES 5
2 LITERATURE SURVEY 6
3 SYSTEM ANALYSIS 11
3.1.1 DRAWBACKS 13
3.2.1 INTRODUCTION 13
3.3.2 CENTROID 21
3.3.3 ALGORITHM 22
4 SYSTEM REQUIREMENTS 25
5 SYSTEM DESIGN 26
vii
5.6.2 DATAFLOW DIAGRAM 36
6 SYSTEM IMPLEMENTATION 39
6.1 IMPLEMENTATIONS 39
6.3 FEATURES 40
7 RESULT ANALYSIS 42
8 CONCLUSION 51
8.1 CONCLUSION 51
REFERENCE 53
viii
LIST OF TABLES
TABLE NO PAGE
TITLE
NO
ix
LIST OF FIGURES
FIGURE PAGE
TITLE
NO NO
x
LIST OF ABBREVIATION
CC CLOUD COMPUTING
CESI CONDUCTING EMPIRICAL STUDIES IN INDUSTRY
CIA CONFIDENTIALITY
DOS DISC OPERATING SYSTEM
DSN DEPENDABLE SYSTEM AND NETWORK
EHR ELECTRONIC HEALTH RECORD
FCM FUZZY C-MEANS CLUSTERING
GPL GLOBAL PROGRAMMING LANGUAGE
GUI GRAPHICAL USER INTERFACE
IT INFORMATION TECHNOLOGY
JDK JAVA DEVELOPMENT KIT
JRE JAVA RUNTIME ENVIRONMENT
JVA JAVA VIRTUAL MACHINE
KNN K-NEAREST NEIGHBOR
MD METHODOLOGY
ML MACHINE LEARNING
NTRU NTH DEGREE TRUNCATED POLYNOMIAL RING UNITS
OCKNN OUTSOURCED COLLABORATIVE K-NEAREST NEIGHBOR
OS OPERATING SYSTEM
QA QUALITY ASSURANCE
QC QUALITY CONTROL
RSSS RAMP SECRET SHARING SCHEME
STEGANOGRAPHIC APPROACH USING HUFFMAN
SAHC
CODING
SDLC SOFTWARE DEVELOPMENT LIFE CYCLE
SE SEARCH ENGINE
SLR SYSTEMATIC LITERATURE REVIEW
STLC SOFTWARE TESTING LIFE CYCLE
UI USER INTERFACE
VM VIRTUAL MACHINE
WORA WRITE ONCE RUN ANYTIME
xi
xii